/external/wpa_supplicant_8/src/eap_common/ |
eap_pax_common.c | 143 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: AK", ak, EAP_PAX_AK_LEN); 144 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: MK", mk, EAP_PAX_MK_LEN); 145 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: CK", ck, EAP_PAX_CK_LEN); 146 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: ICK", ick, EAP_PAX_ICK_LEN); 147 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: MID", mid, EAP_PAX_MID_LEN);
|
eap_fast_common.c | 153 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: EAP-Payload TLV", 165 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Result TLV", pos, len); 190 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Intermediate Result TLV", 216 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Crypto-Binding TLV", 235 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Request-Action TLV", 254 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: PAC TLV", pos, len);
|
eap_sim_common.c | 190 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC - msg", 192 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC - extra data", 194 wpa_hexdump_key(MSG_MSGDUMP, "EAP-SIM: Verify MAC - K_aut", 197 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC: MAC", 219 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Add MAC - msg", msg, msg_len); 220 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Add MAC - extra data", 222 wpa_hexdump_key(MSG_MSGDUMP, "EAP-SIM: Add MAC - K_aut", 226 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Add MAC: MAC", 385 wpa_hexdump(MSG_MSGDUMP, "EAP-AKA': Verify MAC - msg", 387 wpa_hexdump(MSG_MSGDUMP, "EAP-AKA': Verify MAC - extra data" [all...] |
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
dbus_dict_helpers.c | 587 wpa_printf(MSG_MSGDUMP, "%s: start reading a dict entry", __func__); 653 wpa_hexdump_key(MSG_MSGDUMP, "dbus: byte array contents", 705 wpa_printf(MSG_MSGDUMP, "%s: string_array value: %s", 719 wpa_printf(MSG_MSGDUMP, "%s: string_array length %u", 755 wpa_printf(MSG_MSGDUMP, "%s: parsing binarray type %c", __func__, type); 805 wpa_printf(MSG_MSGDUMP, "%s: binarray length %u", 827 wpa_printf(MSG_MSGDUMP, "%s: array_type %c", __func__, array_type); 845 wpa_printf(MSG_MSGDUMP, "%s: unsupported array type %c", 862 wpa_printf(MSG_MSGDUMP, "%s: object path value: %s", 870 wpa_printf(MSG_MSGDUMP, "%s: string value: %s" [all...] |
/external/wpa_supplicant_8/src/drivers/ |
driver_ndis_.c | 48 wpa_hexdump(MSG_MSGDUMP, "NDIS: received event data", buf, len); 63 wpa_hexdump(MSG_MSGDUMP, "NDIS: event data", data, data_len);
|
driver_wired.c | 91 wpa_printf(MSG_MSGDUMP, "handle_data: too short (%lu)", 100 wpa_printf(MSG_MSGDUMP, "Received EAPOL packet"); 151 wpa_printf(MSG_MSGDUMP, "handle_dhcp: too short (%d)", len); 158 wpa_printf(MSG_MSGDUMP, "Got DHCP broadcast packet from " MACSTR,
|
driver_nl80211_scan.c | 199 wpa_hexdump_ascii(MSG_MSGDUMP, "nl80211: Scan SSID", 212 wpa_hexdump(MSG_MSGDUMP, "nl80211: Scan extra IEs", 225 wpa_printf(MSG_MSGDUMP, "nl80211: Scan frequency %u " 524 wpa_hexdump_ascii(MSG_MSGDUMP, 556 wpa_printf(MSG_MSGDUMP, 1061 wpa_hexdump_ascii(MSG_MSGDUMP, "nl80211: Scan SSID", 1072 wpa_hexdump(MSG_MSGDUMP, "nl80211: Scan extra IEs", 1087 wpa_printf(MSG_MSGDUMP, [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_otp.c | 42 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-OTP: Request message", 71 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-OTP: Response",
|
eap_md5.c | 68 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", 96 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", rpos, CHAP_MD5_LEN);
|
eap_pax.c | 163 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: X (server rand)", 169 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ignored extra payload", 178 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: Y (client rand)", 198 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: B = Y (client rand)", 203 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-PAX: CID", 212 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: MAC_CK(A, B, CID)", 221 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", rpos, EAP_PAX_ICV_LEN); 277 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: MAC_CK(B, CID)", 292 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: expected MAC_CK(B, CID)", 303 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ignored extra payload" [all...] |
eap_gtc.c | 62 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-GTC: Request message", pos, len); 114 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-GTC: Response",
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_pax.c | 106 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: A = X (server rand)", 113 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", pos, EAP_PAX_ICV_LEN); 150 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: MAC_CK(B, CID)", 159 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", pos, EAP_PAX_ICV_LEN); 206 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: received payload", 266 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", icv, EAP_PAX_ICV_LEN); 273 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: Expected ICV", 314 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: Y (client rand)", 339 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-PAX: CID", 349 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: MAC_CK(A, B, CID)" [all...] |
eap_server_gtc.c | 104 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-GTC: Response", pos, rlen); 129 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-GTC: Response user", 136 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-GTC: Expected " 163 wpa_hexdump_ascii_key(MSG_MSGDUMP,
|
eap_server_mschapv2.c | 133 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: Challenge", 178 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-MSCHAPV2: Success Request Message", 211 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-MSCHAPV2: Failure Request Message", 327 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: Peer-Challenge", 329 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: NT-Response", nt_response, 24); 330 wpa_printf(MSG_MSGDUMP, "EAP-MSCHAPV2: Flags 0x%x", flags); 331 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-MSCHAPV2: Name", name, name_len); 387 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-MSCHAPV2: User name", 444 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: Expected NT-Response",
|
eap_server_md5.c | 67 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge, 119 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", pos, CHAP_MD5_LEN);
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_client_ocsp.c | 77 wpa_hexdump(MSG_MSGDUMP, "OCSP: Hash (SHA1)", hash, 20); 84 wpa_hexdump(MSG_MSGDUMP, "OCSP: Hash (SHA256)", hash, 32); 91 wpa_hexdump(MSG_MSGDUMP, "OCSP: Hash (SHA384)", hash, 48); 98 wpa_hexdump(MSG_MSGDUMP, "OCSP: Hash (SHA512)", hash, 64); 129 wpa_hexdump(MSG_MSGDUMP, "OCSP: SingleResponse", resp, len); 230 wpa_hexdump(MSG_MSGDUMP, "OCSP: serialNumber", serial_number, 302 wpa_hexdump(MSG_MSGDUMP, "OCSP: singleExtensions", 371 wpa_hexdump(MSG_MSGDUMP, "OCSP: BasicOCSPResponse", resp, len); 437 wpa_hexdump(MSG_MSGDUMP, "OCSP: signature", sign_value, sign_value_len); 449 wpa_hexdump(MSG_MSGDUMP, "OCSP: certs" [all...] |
tlsv1_record.c | 231 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Record Layer - Write HMAC", 293 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Record Layer - Received", 333 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Record Layer - Received", 363 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: Record Layer - Decrypted " 421 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: Record Layer - "
|
x509v3.c | 285 wpa_hexdump(MSG_MSGDUMP, "X509: subjectPublicKey", 435 wpa_hexdump_ascii(MSG_MSGDUMP, "X509: Attribute Data", 705 wpa_printf(MSG_MSGDUMP, "X509: Validity: notBefore: %lu notAfter: %lu", 858 wpa_hexdump_ascii(MSG_MSGDUMP, "X509: altName - rfc822Name", pos, len); 880 wpa_hexdump_ascii(MSG_MSGDUMP, "X509: altName - dNSName", pos, len); 902 wpa_hexdump_ascii(MSG_MSGDUMP, 926 wpa_hexdump(MSG_MSGDUMP, "X509: altName - iPAddress", pos, len); 947 wpa_printf(MSG_MSGDUMP, "X509: altName - registeredID: %s", buf); 1160 wpa_hexdump(MSG_MSGDUMP, "X509: ExtKeyUsageSyntax", pos, end - pos); 1288 wpa_hexdump(MSG_MSGDUMP, "X509: extnValue", hdr.payload, hdr.length) [all...] |
tlsv1_cred.c | 607 wpa_hexdump_key(MSG_MSGDUMP, "PKCS #12: attrValues", 632 wpa_hexdump_key(MSG_MSGDUMP, "PKCS #12: SafeBag", buf, len); 654 wpa_hexdump_key(MSG_MSGDUMP, "PKCS #12: bagValue", value, value_len); 667 wpa_hexdump_key(MSG_MSGDUMP, "PKCS #12: bagAttributes", 761 wpa_hexdump(MSG_MSGDUMP, "PKCS #12: Data", hdr.payload, hdr.length); 808 wpa_hexdump(MSG_MSGDUMP, "PKCS #12: EncryptedContentInfo", 871 wpa_hexdump_key(MSG_MSGDUMP, 892 wpa_hexdump(MSG_MSGDUMP, "PKCS #12: ContentInfo", buf, len); 1025 wpa_hexdump(MSG_MSGDUMP, "PKCS #12: Data content", 1165 wpa_hexdump(MSG_MSGDUMP, "DH: prime (p)", hdr.payload, hdr.length) [all...] |
tlsv1_common.c | 167 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Parse ASN.1 DER certificate", 435 wpa_hexdump(MSG_MSGDUMP, "Additional data after Signature", 440 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Signature", pos, end - pos); 462 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: Decrypted Signature",
|
tlsv1_server_read.c | 165 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ClientHello", pos, len); 204 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client_random", 212 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client session_id", pos + 1, *pos); 223 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client cipher suites", 267 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client compression_methods", 331 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ClientHello " 694 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ClientDiffieHellmanPublic", 1000 wpa_hexdump(MSG_MSGDUMP, "TLSv1: CertificateVerify hash", hash, hlen); 1161 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished", [all...] |
/external/wpa_supplicant_8/src/wps/ |
wps_upnp_ap.c | 35 wpa_hexdump_buf(MSG_MSGDUMP, "WPS: SetSelectedRegistrar attributes",
|
/external/wpa_supplicant_8/wpa_supplicant/ |
main_winmain.c | 34 params.wpa_debug_level = MSG_MSGDUMP;
|
offchannel.c | 201 wpa_hexdump(MSG_MSGDUMP, "TX status frame data", 203 wpa_hexdump_buf(MSG_MSGDUMP, "Pending TX frame", 212 wpa_hexdump_buf(MSG_MSGDUMP, "Pending TX frame", 282 wpa_hexdump_buf(MSG_MSGDUMP, "Pending TX frame", 304 wpa_hexdump_buf(MSG_MSGDUMP, "Pending TX frame",
|
/external/wpa_supplicant_8/src/utils/ |
pcsc_funcs.c | 297 wpa_printf(MSG_MSGDUMP, "SCARD: file header TLV 0x%02x len=%d", 306 wpa_hexdump(MSG_MSGDUMP, "SCARD: File Descriptor TLV", 310 wpa_hexdump(MSG_MSGDUMP, "SCARD: File Identifier TLV", 314 wpa_hexdump(MSG_MSGDUMP, "SCARD: DF name (AID) TLV", 318 wpa_hexdump(MSG_MSGDUMP, "SCARD: Proprietary " 322 wpa_hexdump(MSG_MSGDUMP, "SCARD: Life Cycle Status " 326 wpa_hexdump(MSG_MSGDUMP, "SCARD: File size TLV", 338 wpa_hexdump(MSG_MSGDUMP, "SCARD: Total file size TLV", 342 wpa_hexdump(MSG_MSGDUMP, "SCARD: PIN Status Template " 352 wpa_hexdump(MSG_MSGDUMP, "SCARD: Short File [all...] |